2010 8th Annual Communication Networks and Services Research Conference 2010
DOI: 10.1109/cnsr.2010.48
|View full text |Cite
|
Sign up to set email alerts
|

A Threshold Key Management Scheme for Mobile Ad Hoc Networks Using Elliptic Curve Dlog-Based Cryptosystem

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
2
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 23 publications
1
2
0
Order By: Relevance
“…The degree of the secret sharing polynomial used by the off-line authority to generate the shares matrix for each node determines the number of neighboring nodes needed to provide the required shares to session members. This paper extends our previous work in Reference [3] by introducing the shares matrices refreshing algorithm and the new member joining algorithm. In Reference [3], the performance of the session key generation (SKG) algorithm was evaluated with respect to the CA threshold (t) only, but in this paper we measure the computations and communications overheads of the proposed scheme with respect to both the CA threshold (t) and the group threshold (k).…”
Section: Introductionsupporting
confidence: 52%
“…The degree of the secret sharing polynomial used by the off-line authority to generate the shares matrix for each node determines the number of neighboring nodes needed to provide the required shares to session members. This paper extends our previous work in Reference [3] by introducing the shares matrices refreshing algorithm and the new member joining algorithm. In Reference [3], the performance of the session key generation (SKG) algorithm was evaluated with respect to the CA threshold (t) only, but in this paper we measure the computations and communications overheads of the proposed scheme with respect to both the CA threshold (t) and the group threshold (k).…”
Section: Introductionsupporting
confidence: 52%
“…Despite this, there are rich literatures on public key management in MANETs (see Refs [12][13][14][15][16][17] for example). This approach can cause both unfavorable communication latency and often tremendous communication overhead, which are also the drawbacks of self-organized key management schemes [18,19]. (2) ID-based cryptography for MANETs has been gaining momentum in recent years [2][3][4]8].…”
Section: Related Workmentioning
confidence: 99%
“…Key management is defined as a set of procedures to support the cryptographic algorithm , including initial parameters, key pairs, and secret values. Usually, a key management scheme in MANETs only provides one type of key management method, such as threshold key management scheme , group key management scheme , autonomous key management scheme , identity (ID)‐based key management scheme , and key pre‐distribution management scheme . In , ID‐based and threshold cryptography are combined to give a certificateless solution in MANET.…”
Section: Introductionmentioning
confidence: 99%